CVE-2022-30592

9.8 CRITICAL

📋 TL;DR

This vulnerability in LiteSpeed QUIC (LSQUIC) before version 3.1.0 involves improper handling of MAX_TABLE_CAPACITY in the QPACK encoder, which can lead to a NULL pointer dereference. Attackers can exploit this to cause denial of service or potentially execute arbitrary code. Any system using vulnerable LSQUIC versions is affected.

💻 Affected Systems

Products:
  • LiteSpeed QUIC (LSQUIC)
  • LiteSpeed Web Server
  • OpenLiteSpeed
  • Applications using LSQUIC library
Versions: All versions before 3.1.0
Operating Systems: Linux, Unix-like systems, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any configuration using QUIC protocol with vulnerable LSQUIC library

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise

🟠

Likely Case

Denial of service causing service disruption

🟢

If Mitigated

Service interruption with no data loss if proper segmentation exists

🌐 Internet-Facing: HIGH - Exploitable remotely without authentication
🏢 Internal Only: MEDIUM - Requires network access but no authentication

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity and no authentication required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.0 and later

Vendor Advisory: https://github.com/litespeedtech/lsquic/releases/tag/v3.1.0

Restart Required: Yes

Instructions:

1. Download LSQUIC v3.1.0 or later from GitHub releases
2. Replace existing LSQUIC installation with patched version
3. Recompile any applications using LSQUIC library
4. Restart affected services

🔧 Temporary Workarounds

Disable QUIC protocol

all

Temporarily disable QUIC protocol to mitigate vulnerability

# For LiteSpeed Web Server: edit configuration to disable QUIC
# In httpd_config.conf: set enableQuic to 0

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy WAF rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check LSQUIC library version: lsquic-config --version or examine linked library version in applications

Check Version:

lsquic-config --version || strings /path/to/liblsquic.so | grep 'LSQUIC_'

Verify Fix Applied:

Verify version is 3.1.0 or higher and check for commit a74702c630e108125e71898398737baec8f02238

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes
  • Memory access violation errors
  • QUIC connection failures

Network Indicators:

  • Malformed QUIC packets targeting MAX_TABLE_CAPACITY
  • Unusual QUIC protocol traffic patterns

SIEM Query:

source="*lsquic*" AND ("segmentation fault" OR "null pointer" OR "MAX_TABLE_CAPACITY")

🔗 References

📤 Share & Export